Vice President, Security Engineer - Morgan Stanley

Timestamp: 2015-12-25

• Over 12 year's military and professional experience in information security, computer forensics, military intelligence and customer service. • Strong abilities with threat detection and mitigation utilizing all main stream utilities. • Strong understanding of forensic science relating to digital and analog media. Both formally trained and experienced in the use of EnCase/Encase Enterprise Forensic Software and the Advanced EnCase Course. • Lead digital forensic developer/Instructor at the Joint Exploitation Training Center for US SOCOM. • Familiar with Microsoft Office Suite and other computer forensic hardware/software. Proficient in providing written reports of exploited cases. Transferred images, reports and files to various hardware and applications for shipment. • Supported computer forensics and incident response activities for a civil agency, commercial and military organizations. • Worked closely with client operations and engineering organizations to develop incident response plans. Conducted the coordination of major information security incidents, including support to client internal communications. • Established an internal knowledge base of possible external threats and provided real-time information to operations teams. • Conducted examinations of computers and media generated by computers to develop evidence in support of internal and external investigations in the specialty area of forensics. Identified and recommend methods and procedures for preservation, evidence recovery, and the presentation of computer evidence. • Managed groups of 45 members. • Performed R&D for Global Customers such as Guidance Software, Tableau and Digital Intelligence.TECHNICAL SUMMARY: • Advanced Biometrics (Seek, Fuming, Ruvis, NiN); Linux (BT, Gentoo, Helix); Encase, FTK, Helix, Cd/Dvd Inspector, and various forensic utilities; Enscripting; Minimal Microsoft Access; Various network scanners to include Nmap; Metasploit and Nessus; Generalized IT security; Minimal bash/python coding; Password cracking using many different utilities/hardware; 802.11 wireless penetration; Target information collection; Sensitive site exploitation (SSE).

Security Incident Response and Forensics Specialist

Start Date: 2013-06-01End Date: 2014-11-01

Provided enterprise level forensics and incident response to Hewlett-Packard Corporation and all of their exterior facing clientele • Analyze incident event data from all major SEIMS. • Managed many cases during and after the on call rotation. • Performed malware analysis using various utilities and techniques. • Regularly used Encase, FTK, Cellebrite, Helix, and various other programs and devices. • Used Windows, Linux and Unix environments on every case in one way or another. • Monitor live active ad open source threats. • Maintain high level knowledge of current APT. • Analyze logs of almost any variant while utilizing many tools out there such as L2t. • Write detailed written reports on findings and future solutions • Test and Review security and production products for use in our environment • Perform both live and dead box forensics • Assisted with coding changes and development for client side forensic acquisition tools.

Vice President - Seccurity Incident Response

Timestamp: 2015-12-25

• Over 12 year's military and professional experience in information systems, computer forensics, military intelligence and customer service. • Strong understanding of forensic science relating to digital and analog media. Both formally trained and experienced in the use of EnCase Forensic Software and the Advanced EnCase Course. • Lead Digital Forensic developer/Instructor at the Joint Exploitation Training Center for SOCOM. • Strong working experience with Encase Enterprise. • Familiar with Microsoft Office Suite and other computer forensic hardware/software. Proficient in providing written reports of exploited cases. Transferred images, reports and files to various hardware and applications for shipment. • Supported computer forensics and incident response activities for a civil agency, commercial and military organizations. • Worked closely with client operations and engineering organizations to develop incident response plans. Conducted the coordination of major information security incidents, including support to client internal communications. • Established an internal knowledge base of possible external threats and provided real-time information to operations teams. • Conducted examinations of computers and media generated by computers to develop evidence in support of internal and external investigations in the specialty area of forensics. Identified and recommend methods and procedures for preservation, evidence recovery, and the presentation of computer evidence. • Managed groups of 45 members. • Performed R&D for Global Customers such as Guidance Software, Tableau and Digital Intelligence.TECHNICAL SUMMARY: • Advanced Biometrics (Seek, Fuming, Ruvis, NiN); Linux (BT, Gentoo, Helix); Encase, FTK, Helix, Cd/Dvd Inspector, and various forensic utilities; Enscripting; Minimal Microsoft Access; Various network scanners to include Nmap; Metasploit and Nessus; Generalized IT security; Minimal bash/python coding; Password cracking using many different utilities/hardware; 802.11 wireless penetration; Target information collection; Sensitive site exploitation (SSE).

Cyber Threat Intelligence Analyst - Armor Defense Inc

Information Security Analyst

Start Date: 2014-09-01End Date: 2015-03-01

• Interact with various teams and stake holders to include but not limited to: COO, CSO, CIO, CISO, VP Security, SIM, Vulneribility and Threat Management, Friendly Network Forces. University of Texas at Tyler Tyler, TX September 2014 - March 2015 Information Security Analyst • Provide support and implementation of the UT Tyler Information Security program under the direction of the Information Security Officer. • Assist the security team in support of information security projects and requirements • Assist in the development, implementation, and updating of security policies and procedures. • Facilitate the handling, reporting, recording, and resolution of campus-wide security incidents • Assist in the development, implementation, and monitoring of access control, data confidentiality, system integrity, system reliability, system audit and recovery methods and procedures. • Support of security equipment to ensure proper operation, including but not limited to installation and upgrades. • Support the development and implementation of security awareness training programs. Interface with campus support personnel to resolve security related issues.

International AffairsIn tern

Start Date: 2015-05-01End Date: 2015-08-01

Led teams and worked independently on several projects simultaneously with U.S. Government professionals and interns Produced high quality written reports with 3D Google Earth imagery incorporated within scheduled timelines that exceeded customer needs Cultivated professional network and worked collaboratively with U.S. military officers, and instructors from various federal agencies by performing various research projects that demonstrated critical thinking, flexibility, high technical competence, and preference for IMGINT and GEOINT Editor of the Eagle Eye, a weekly alumni newsletter geared towards international counterterrorism professionals, containing forty of the best think-tank publications with succinct commentary to illustrate the contemporary security environment, 520 articles in four months Designed database and Environmental Systems Research Institute (ESRI) geospatial mapping solution (ARCgis) for categorizing and displaying instances of irregular warfare conducted by the U.S. and its citizens as a teaching tool for graduate level military instructors, and defended the project by presenting it to various audiences including the chancellor of the College of International Security Affairs Designed an OSINT interactive mapping solutions for a non-combatant evacuation operation simulation for the Foreign Service which included evacuation routes and satellite imagery of landing zones

Cyber Intelligence Analyst

Timestamp: 2015-12-25

• Over ten years of experience working for the US Government as an All-Source Intelligence Analyst with experience in managing operations, planning, and training. • Developed and briefed daily intelligence products to senior leadership. Intelligence products include: White Papers, Daily Intelligence Summaries, and Weekly Trends Summaries. • Experience with Pathfinder, Analyst Notebook, TIGR, ArcGIS, Link and Pattern Analysis, OSINT, and the Microsoft Office suite to include Word, PowerPoint, and Excel. • Experienced at all levels of the intelligence process; targeting, gathering, and analyzing the information that led to improved information sharing. • Highly skilled and diverse intelligence analyst that produces high value intelligence products with extreme attention to detail; capable of learning new analytic roles and tools quickly. • Possess excellent research and problem solving skills, as well as superior written and oral communication skills.

Senior Intelligence Analyst, S2

Start Date: 2009-06-01End Date: 2012-11-01

• Mentored, trained and managed over 20 intelligence personnel within a mid- level Army intelligence section while deployed as part of a Joint Fusion Cell in support of Operation Enduring Freedom from July 2009-June 2010. • Analyzed all-source intelligence information to provide the customer with assessments and reports facilitating situational awareness and understanding of current threats and adversaries. • Produced daily Intelligence Summaries (INTSUMs) and created long-term analysis products relating to narcotics, targets of interest and threat finance that were briefed to key personnel. • Served concurrently as the unit security manager, maintained over 250 Top Secret security; aided in the accreditation of the unit's first Secured Compartmented Information Facility (SCIF). • Ensured personnel and physical security standards, policies, and procedures were implemented to the highest degree. • Created the unit's first training program and facilitated training for over 60 non-intelligence analyst personnel to become functioning analysts on support teams in preparation for deployment to Afghanistan.

Intelligence Analyst, S2, 1st Information Operations CMD

Start Date: 2005-07-01End Date: 2009-06-01

• Served primarily as the lead All-Source Intelligence Analyst on the Afghanistan Information Operations (IO) Team. • Supervised the integration of All-Source Intelligence into the IO architecture for use by the geospatial team while appointed as the Geospatial Intelligence (GEOINT) supervisor. • Managed the Analysis and Control Element (ACE) and GEOINT sections simultaneously while maintaining • Coordinated with National and Joint organizations in order to support forward deployed Field Support Teams in Operation Enduring Freedom and Operation Iraqi Freedom. • Selected over five others to deploy in support of Operation Iraqi Freedom for six months as the security manager from April-October 2007; managed over 500 service members' SCI clearances, and ensured both personnel and physical security measures were followed. • Updated and requested security clearances; maintained classified materials.

Intelligence Analyst

Start Date: 2015-06-01

Responsibilities -Investigate non-immigrant visa holders who violate their immigration status as well as scrutinize the activities of known or suspected terrorists and terrorist associations, as well as combat the criminal exploitation of the student visa system. -Research over 25 government and open source (OSINT) databases to include: Treasury Enforcement Communication System (TECS), the Department of State’s Consular Consolidated Database (CCD), Student and Exchange Visitor Information System (SEVIS), Central Index System (CIS), LeadTrac, and other various databases to determine status violations and lead viability. -Build reports (leads) to determine the legal status of visitors and students who entered the country on a specific visa. Build cases for field agents to conduct a “knock and talk” or an arrest and potential removal of the given subject from the United States. -Assist with ad hoc requests and special missions as assigned

Cyber Security Engineer - Viewpost, LLC

Cyber Security Engineer

Start Date: 2014-07-01

Managed and conducted phishing campaigns across the organization in order to increase the security awareness; part of this effort is responsible for winning the Elite 2015 CSO50 Award. • Member of the Penetration Testing Team. In charge of finding and exploiting vulnerabilities (creation of Proof of Concepts) within the Viewpost environment by using Nessus, nmap, Kali Linux tools, and Python as the scripting language. • • Protection of the corporate infrastructure from infiltration or exfiltration as a part of the Security Operations Center (SOC) and SIRT. • Perform daily checks of the security appliances that are deployed throughout the organization like IDSs, IPSs, HIPs, OS, AVs, and WAFs among others, looking for anomalies on our network traffic in an effort to locate and remediate unauthorized activity. • Monitor information security alerts though the use of SEIM to respond, triage, and escalate as needed. o Convert data into actionable information in a timely manner by correlating alert information from different appliances like, • Splunk, McAfee, FireEye, SourceFire, PaloAlto Network firewalls, Confer, Websense, 2FA (Duo), BYOD (AirWatch), File Integrity Monitoring (Bit9), Secure E-mail Gateway and Data Loss Prevention (Proofpoint), WAF (F5), VPN (Juniper) o Daily check of Open-source intelligence (OSINT) that could provide some Intel on threats that could directly impact the organization.\ o Process automation by the creation of tools in order to accelerate the triage cycle. • IRT email analysis. This is an Outlook Plugin that I created in Visual Studio .NET 2010 that allowed to team to gather key information from external and internal emails. • Splunk Alert and Dashboards. • A PowerShell script that checked the local accounts password age on devices and workstations across the environment. o Key member of the Digital Forensic Team, where I assisted on the creation of multiple SOP for all the Forensic evidence handling mechanisms, chain of custody, etc.

OSINT/Hermes Analyst

Start Date: 2014-11-01

Currently serving as an Army Open Source Intelligence Analyst at Headquarters Intelligence and Security Command. Delivering open source unclassified information to U.S. and coalition networks for integration into the intelligence cycle and military decision making process. Provides mission focused open source and unclassified support to world-wide Army operations, crisis response, and regional operations.

CONSULTANT (OSINT/Systems Administration)

Start Date: 2006-08-01

• Designed, developed, and deployed encrypted communications and network access system for use by indivduals and researchers in interdicted countries. • Open Source research and investigations to support company and client projects. • Lead Digital Security and Forensic investigator for client data breaches. • Designed and deployed Virtual Financial Servers for encrypted access. • Trouble Ticket management and User support for company Use Policies. • Support and Manage collocated Servers (2003, Linux, MySQL replication, Apache, Drupal). • Company wide Network Design, implementation, and training of support personnel.

Advocacy and Legislative Affairs Intern for Defense Budgetary Issues

Start Date: 2011-09-01End Date: 2011-11-01

Fall, 2011) Wrote executive summaries of Armed Services congressional testimony. Attended various think-tanks relating to military policy such as the Heritage Foundation and the American Enterprise Institute and wrote executive summaries on events such as military policy, budget cuts, austerity measures, missile defense, Islamic terrorism, Chinese power, and sequestration. Provided in-depth analysis on the Defense Authorization Budget for the 2012 Fiscal Year. Performed editorial work on reports relating to Reserve and Guard affairs.

Program Assistant

Start Date: 2014-02-01

Responsibilities • Enhanced training courses through analysis of events and their impact on current and future operations, policy, and procedures derived from articles, geo-political and socioeconomic factors, foreign state policies, and feedback from personnel on high threat post assignments. • Managed a yearly division budget of approximately $1.35 million, assessing effects of budgetary impacts and providing recommendations regarding the mitigation of such impacts. • Coordinated the operations of over 5 major training courses including Cable and Memo Writing, Pakistan Familiarization, Iraq Familiarization, Diplomacy at High Threat Posts, and Foreign Affairs Counter Threat.

Information Systems Security Officer

Start Date: 2009-10-01End Date: 2011-05-01

Responsibilities -Development of IT security policies / procedures and ensuring procedures were followed in a military classified environment. -Security auditing to include audit log and network log review weekly. -Coordinate and develop information assurance security awareness training quarterly. -Supervise initial system security configuration. -Ensure security updates / patching is occuring. -Review of group and user profile settings and policy on Windows and Unix servers. -Intimate familiarity with: Intelligence Community Directives 503, 703, 704, 705. Accomplishments -Rewrote system security plans for two classified networks. -Developed standard operating procedures for all subordinate Marines to use when configuring, servers, desktops, laptops, routers, and cryptologic equipment. -Conducted security awareness training four times and had no security incidents or violations. -Mentored subordinate Marines on IT security and information assurance on several occasions. -Performed security audits 36 times. -Supervised and coordinated effort for life cycle development upgrades and maintenance eight times with no outages or problems.

Senior Fraud Analyst - Guardian Analytics

Field Investigator

Start Date: 2010-01-01End Date: 2010-01-01

Contractor to the federal government providing services in personnel background investigations. • Investigated background of individuals for positions with the federal government by means of personal interviews including in-depth Single Scope Background Investigations, and government and employment record reviews. • Position required federal security clearance to obtain access to government personnel files and government contractor locations. • Ensured security of personal information provided by interview subjects and information sources. • Wrote detailed reports of investigation for government client review and adjudication for issuing security clearances.

Associate Fraud Investigator

Start Date: 2007-01-01End Date: 2008-01-01

Analyzed reports of fraud involving fraudulent or unauthorized Automated Clearing House transactions and attempted to recover funds from receiving financial institutions through Letters of Indemnity. • Coordinated with financial institutions to preempt fraudulent transactions and facilitate recovery of funds, which included one case where the transfer of $10K out of U.S. obtained as a result of a street crime was stopped. • Identified possible trends in fraudulent financial transactions (i.e. "Nigerian Scams") • Prepared Suspicious Activity Reports using proprietary automated tool. • Conducted link analyses to identify victims and fraudsters, providing this information to fraud investigators for more in-depth investigations

Advisor

Start Date: 2004-08-01End Date: 2005-03-01

at U.S. Army training academy, Taji, Iraq. • Arabic linguist/trainer at the Iraqi Electrical Power Security Service (EPSS) training academy. • Conduct course translation and quality control, English and Arabic. • Oversee and monitor local linguists. • Liaise and coordinate meeting with the Iraqi government, e.g., Ministry of Oil.

Sr. Information Security Engineer

Timestamp: 2015-12-25

I am currently a Sr. Information Security Engineer supporting the U.S. Secretary of Defense. Our primary mission involves maintaining the operation and defense of the U.S. Secretary and his/her immediate staffs’ computer and telecommunications network. I have experience in technical Cyber Threat Intelligence (TI), Computer Network Defense (CND), Incident Response (IR), Information Assurance (IA) and Vulnerability Management. I have a desire to work in an organization that will allow me to capitalize on my existing experience in information security and military intelligence, paired with my educational background in systems management and homeland security. I am a proud active service member and Officer in the United States Army Reserve, and I am looking for a work environment in which the common goal is what is in the best interest of the organization. While possessing leadership experience, I am looking to leverage these skills in a progressive company while broadening my technical background. I currently possess an active Top-Secret/SCI security clearance (granted 2013).

Chinese Linguist - Chenega Technical Innovation Incorporated

Timestamp: 2015-12-25

To obtain a management position as a administrative officer Announcement Number: […] USAJOB Control Number […]• Current active Top Secret - SCI Clearance • 15 years tactical and strategic experience as Military Chinese Mandarin/Amoy linguist • Attended ICC in 2008 and taught Defense Language Institute's intermediate and advance course for Chinese Mandarin students and mentored linguists

Graphic Documentation Illustrator

Start Date: 1990-01-01End Date: 1991-01-01

Supervised, managed 33 units as the main graphic illustrator while in combat • Multitasked and made sound decisions while working as S-2/3 (Security and Operations) • Assisted in strategic planning while handling confidential information in time of war

Senior Documentation Specialist

Start Date: 2005-01-01End Date: 2006-01-01

• Quickly completed technical writing projects to turn around a department that was understaffed and behind schedule, increasing overall productivity of the department • Effectively communicated across departmental lines to assure accuracy of technical manuals, worksheets, and documents submitted by various IT teams in the Joint Deployable Intelligence Support System (JDISS) program

TS/SCI URDU/ PUNJABI/ HINDI LANGUAGE ANALYST

Timestamp: 2015-12-25

Possess over 14 years’ professional experience in OSINT collection, language analysis, counter-intelligence analysis and project management. At my current position as a Project manager and a senior language enabled research analyst, I have gained a vast experience in intelligence report writing, foreign language cyber research, translation and counter intelligence analysis. I have also attained significant management experience while working as project manager. I have honorably served in Unites States Marine Corps active service component for four (4) years as a Language enabled analyst.

Military Linguist (8611)

Start Date: 1999-10-01End Date: 2003-10-01

• Primary MOS as a legal administrative in the Active military services. • Secondary MOS as a military Linguist in the Active military services. • Translate, summarize, and edit Urdu language materials to English. • Provided key translations in Urdu language, and became the Area Specialist for linguistic, cultural and regional matters. • Provided timely and accurate transcriptions to support ground, air, and naval troops in the region. • Participated and worked as a translator for 10 months in Anti-Terrorism Mission with Police Department of Special Investigation in Sicily, Italy in association with Naval Criminal Investigative Support.